The Security section in SurveySensum allows administrators to manage keys used for secure communication and encrypted data exchange between SurveySensum and external systems.
Within the Security section, users can manage the following key types:
SSH Keys – Used for secure authentication and system integrations without using passwords.
PGP Inbound Keys – Used to securely receive encrypted data from external systems.
PGP Outbound Keys – Used to encrypt data before sending it to external systems.
By configuring these keys, organizations can maintain secure integrations, encrypted data transfers, and stronger access control across their systems.
SSH keys provide a secure way to authenticate external systems or scripts without using passwords. Instead of relying on traditional credentials, SSH keys use cryptographic key pairs to establish a trusted connection between SurveySensum and other systems.
This feature is typically used when:
Integrating SurveySensum with external systems
Enabling secure automated data transfers
Allowing backend systems to access services securely
Follow these steps after log in to your SurveySensum account to navigate to the SSH Keys section:
Click on Settings from the top navigation bar.
From the left-side menu, select Security Keys.
Inside the Security Keys section, open the SSH Keys tab.
4.1 The Key Name field is used to assign a unique identifier to the SSH key.This name helps administrators recognize the purpose of the key later. Using descriptive names makes it easier to manage multiple keys.4.2 The Key Description field allows users to add additional context about the SSH key.This is useful when multiple team members manage integrations or when several keys exist. Although optional, adding a description improves documentation and maintainability.

3.1 Name – Shows the name assigned to the SSH key.3.2 Fingerprint – A unique identifier for the key. You can copy it using the Click to Copy After copying it, the fingerprint can be shared with external systems, integration partners, or administrators to confirm that the correct key has been configured on both sides verification.When an SSH key is created, the system generates a very long key (hundreds of characters). Instead of comparing the entire key, systems generate a short summary of that key called a fingerprint.3.3 Created On – Indicates when the key was generated.
3.4 Status – Shows whether the key is Active or Expired3.5 Download Public Key- This option allows users to download the public key file. The public key can be shared with external systems or integration partners to enable secure authentication or encrypted data transfers. External systems use this key to encrypt data before sending it to SurveySensum or to verify secure connections.
The PGP Inbound feature in SurveySensum allows organizations to securely receive encrypted data using PGP (Pretty Good Privacy) encryption.

This feature is particularly useful when:
External systems send sensitive data files
Data needs to be securely imported into SurveySensum
Organizations follow strict data security and compliance requirements
Follow these steps after log in to your SurveySensum account to navigate to the PGP Inbound Keys section:
Click Settings from the top navigation bar.
From the left panel, select Security Keys.
Click the PGP - Inbound tab.
Click Generate New Key to create a new inbound encryption key.
4.1 The Key Name field is used to assign a unique identifier to the SSH key.This name helps administrators recognize the purpose of the key later. Using descriptive names makes it easier to manage multiple keys.4.2 The Key Description field allows users to provide additional information about the key.This helps teams understand the purpose or usage of the key. Although optional, adding a description helps improve documentation and key management.

3.1 Name – Shows the name assigned to the inbound key.3.2 Fingerprint – A unique identifier for the key. You can copy it using the Click to Copy After copying it, the fingerprint can be shared with external systems, integration partners, or administrators to confirm that the correct key has been configured on both sides verification.When an Inbound key is created, the system generates a very long key (hundreds of characters). Instead of comparing the entire key, systems generate a short summary of that key called a fingerprint.3.3 Created On – Indicates when the key was generated.
3.4 Status – Shows whether the key is Active or Expired3.5 Download Public Key- This option allows users to download the public key file. The public key can be shared with external systems or integration partners to enable secure authentication or encrypted data transfers. External systems use this key to encrypt data before sending it to SurveySensum or to verify secure connections.

PGP Outbound encryption is commonly used when:
Sending survey data to external systems
Integrating with third-party platforms that require encrypted file transfers
4.1 Click the upload area to select a file.4.2 Click Upload Key to add the public key to the system.4.3 The Cancel button closes the upload window without uploading the key.


Always verify the public key provided by the receiving system before uploading it. This ensures that encrypted data is sent to the correct destination and can only be decrypted by the intended recipient.

3.1 Name – Shows the name assigned to the inbound key.3.2 Fingerprint – Displays the key fingerprint (may appear as unavailable for some uploaded keys). A unique identifier for the key. You can copy it using the Click to Copy After copying it, the fingerprint can be shared with external systems, integration partners, or administrators to confirm that the correct key has been configured on both sides verification.When key is created, the system generates a very long key (hundreds of characters). Instead of comparing the entire key, systems generate a short summary of that key called a fingerprint.3.3 Created On – Indicates when the key was generated.
3.4 Status – Shows whether the key is Active or Expired3.5 Download Public Key- This option allows users to download the public key file which you uploaded. The public key can be shared with external systems or integration partners to enable secure authentication or encrypted data transfers.